libyal / libsigscanLinks
Library for binary signature scanning.
☆28Updated 10 months ago
Alternatives and similar repositories for libsigscan
Users that are interested in libsigscan are comparing it to the libraries listed below
Sorting:
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Updated 9 years ago
- Anti-AV compilation☆44Updated 11 years ago
- windows create process with a dll load first time via LdrHook☆30Updated 8 years ago
- MALM: Malware Monitor☆49Updated 12 years ago
- Dump Windows PE file information in C☆23Updated 10 years ago
- C++ wrapper for YARA.☆45Updated 5 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆28Updated 11 years ago
- Various libraries focused on examining/parsing NTFS-specific structures☆16Updated 9 years ago
- Malware monitor template based on MinHook☆16Updated 10 years ago
- ☆28Updated 3 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36Updated 9 years ago
- ☆33Updated 6 years ago
- Simple tool for unpacking packed/protected malware executables.☆33Updated 13 years ago
- ☆28Updated 8 years ago
- Sample libraries to be used with IAT Patcher☆34Updated 2 years ago
- Anti-Anti-Debugger Plugins☆19Updated 11 years ago
- x64 Windows Software Fault Injection Tool☆17Updated 7 years ago
- OpenHIPS prevents exploitation of Windows systems☆35Updated 12 years ago
- OllyCallTrace is a plugin for OllyDbg to trace the call chain of a thread.☆53Updated 13 years ago
- IDA recompiler☆31Updated 10 years ago
- Library and tools to access the Microsoft Internet Explorer (MSIE) Cache File (index.dat) files☆16Updated 11 months ago
- CAPE monitor DLLs☆41Updated 5 years ago
- Analysis PE file or Shellcode☆49Updated 8 years ago
- modify binary Portable Executable to hook its export functions☆63Updated 6 years ago
- ☆31Updated 9 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 9 years ago
- Bootkits Revisited☆40Updated 11 years ago
- ☆11Updated 10 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆41Updated 12 years ago
- This is a demo project to illustrate the way to verify and restore original SST in case of some malware hooks☆33Updated 8 years ago